US7430301B2 - Method for the enhancement of complex peaks - Google Patents

Method for the enhancement of complex peaks Download PDF

Info

Publication number
US7430301B2
US7430301B2 US10/499,141 US49914104A US7430301B2 US 7430301 B2 US7430301 B2 US 7430301B2 US 49914104 A US49914104 A US 49914104A US 7430301 B2 US7430301 B2 US 7430301B2
Authority
US
United States
Prior art keywords
signal
complex
peak value
sub
correlation signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/499,141
Other versions
US20050111691A1 (en
Inventor
Kieran Gerard Larkin
Peter Alleine Fletcher
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FLETCHER, PETER ALLEINE, LARKIN, KIERAN GERARD
Publication of US20050111691A1 publication Critical patent/US20050111691A1/en
Application granted granted Critical
Publication of US7430301B2 publication Critical patent/US7430301B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/15Correlation function computation including computation of convolution operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • G06V10/7515Shifting the patterns to accommodate for positional errors

Definitions

  • the correlation peak may be only marginally above the background noise level in the correlation signal. Additionally, it often occurs that the correlation peak does not correspond with a signal sample position. The result is that the correlation peak appears attenuated, compared to its ideal, or potential peak value. This is potentially problematic as a peak may be missed in a peak detection process because the peak may not have a value higher than a predetermined value. Another potential problem is that, even when the peak is appropriately detected, the location of the peak may be incorrectly ascribed, as the true location of the peak is somewhere between sample positions.

Abstract

A method (200) of enhanced peak detection in a correlation signal (g(x)) is disclosed. The method (200) comprises identifying (215) in the correlation signal (g(x)) positions where the modulus value of the correlation signal is above a first predetermined value. Each of the identified positions is then processed by forming (220) a sub-signal from the correlation signal by isolating a region of samples, the region comprising substantially equal numbers of samples on opposite sides of the identified position. The sub-signal is then up-sampled (221, 222, 225) to a higher resolution using Fourier interpolation. The up-sampled sub-signal is searched (230) for a peak value, and when the peak value is greater than a second predetermined value, parameters associated with the peak value is stored (236).

Description

TECHNICAL FIELD OF THE INVENTION
The present invention relates generally to detecting peaks in sampled correlation signals and, in particular, to detecting an underlying peak position when the peak itself is not necessarily visible in the sampled correlation signal.
BACKGROUND ART
The need to detect peaks in signals occurs as part of many schemes and methods of data analysis. One such area is object detection using correlation. The output of a correlation detector is a signal in which the positions of peaks indicate the positions where the object was present.
For example, watermarking often relies on the imperceptible embedding of a known pattern in a signal, with the signal being a single-dimensional signal, or multi-dimensional signal such as an image, video or 3D space. The detection of the presence of the known embedded pattern is then facilitated by a matched filtering operation, which is commonly called correlation. The result of correlation of suitable patterns is a sharp peak at the position of best overlap between the known pattern and the signal with the embedded pattern. However, it is often desirable to make the intensity of the embedded pattern as small as reasonably possible, thereby allowing the embedded pattern to be imperceptible by a human. For example, it is desirable for the embedded pattern to be imperceptible to the human eye in the case of an image watermarking, or human ear in the case of audio watermarking.
Due to the low intensity of the embedded pattern, the correlation peak may be only marginally above the background noise level in the correlation signal. Additionally, it often occurs that the correlation peak does not correspond with a signal sample position. The result is that the correlation peak appears attenuated, compared to its ideal, or potential peak value. This is potentially problematic as a peak may be missed in a peak detection process because the peak may not have a value higher than a predetermined value. Another potential problem is that, even when the peak is appropriately detected, the location of the peak may be incorrectly ascribed, as the true location of the peak is somewhere between sample positions.
SUMMARY OF THE INVENTION
It is an object of the present invention to substantially overcome, or at least ameliorate, one or more disadvantages of existing arrangements.
According to a first aspect of the invention, there is provided a method of enhanced peak detection in a correlation signal, said method comprising the steps of:
(a) identifying in said correlation signal at least one position with a modulus value above a first predetermined value; and
(b) for each said identified position performing the steps of:
    • (ba) forming a sub-signal by isolating a region of samples of said correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
    • (bb) up-sampling said sub-signal to a higher resolution using Fourier interpolation;
    • (bc) searching said up-sampled sub-signal for a peak value; and
    • (bd) storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
According to another aspect of the invention, there is provided an apparatus for implementing the method.
Other aspects of the invention are also disclosed.
BRIEF DESCRIPTION OF THE DRAWINGS
One or more embodiments of the present invention will now be described with reference to the drawings, in which:
FIG. 1 is a schematic block diagram of a general-purpose computer upon which arrangements described can be practiced;
FIG. 2A shows an example signal in which a test pattern is embedded;
FIG. 2B shows the test pattern embedded in FIG. 2A;
FIG. 2C shows the magnitude of the correlation signal resulting from correlating the example signal with the test pattern;
FIG. 3A shows the magnitude values formed from isolating 8 values around the peak of the correlation signal shown in FIG. 2C;
FIG. 3B shows the magnitude of an up-sampled correlation signal of the 8 values around the peak of the correlation signal shown in FIG. 3A;
FIGS. 3C and 3D show an ideal correlation peak and its associated up-sampled correlation signal;
FIG. 4 shows a method of enhanced peak detection in a correlation signal;
FIG. 5 illustrates a process of calculating the correlation of a signal with a test pattern to form a correlation signal;
FIG. 6 shows a watermarking detection method which utilizes the peak detection arrangement of FIG. 4; and
FIGS. 7A and 7B show the real and imaginary parts respectively of a typical two dimensional LRHF.
DETAILED DESCRIPTION INCLUDING BEST MODE
Some portions of the description which follows are explicitly or implicitly presented in terms of algorithms and symbolic representations of operations on data within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as values, functions, patterns, numbers, arrays or the like.
The present specification also discloses apparatus for performing the operations of the methods. Such apparatus may be specially constructed for the required purposes, or may comprise a general-purpose computer or other device selectively activated or reconfigured by a computer program stored in the computer. Various general-purpose machines may be used with programs in accordance with the teachings herein. Alternatively, the construction of more specialized apparatus to perform the required method steps may be appropriate. The structure of a conventional general-purpose computer will appear from the description below.
In addition, the present specification also discloses a computer readable medium comprising a computer program for performing the operations of the methods. The computer readable medium is taken herein to include any transmission medium for communicating the computer program between a source and a designation. The transmission medium may include storage devices such as magnetic or optical disks, memory chips, or other storage devices suitable for interfacing with a general-purpose computer. The transmission medium may also include a hard-wired medium such as exemplified in the Internet system, or wireless medium such as exemplified in the GSM mobile telephone system.
Where reference is made in any one or more of the accompanying drawings to steps and/or features, which have the same reference numerals, those steps and/or features have for the purposes of this description the same function(s) or operation(s), unless the contrary intention appears.
The apparatus for performing the operations of the disclosed methods is preferably a general-purpose computer system 100. The computer system 100 comprises a computer module 102, input devices such as a keyboard 110, a mouse 112, an imaging device 108 and a microphone 109, and output devices including a display device 104. The imaging device 108 may include for example a digital camera or a scanner. A Modulator-Demodulator (Modem) transceiver device 106 is used by the computer module 102 for communicating to and from a communications network 140, for example connectable via a telephone line or other functional medium. The modem 106 can be used to obtain access to network systems, such as the Internet, a Local Area Network (LAN) or a Wide Area Network (WAN).
The computer module 101 typically includes at least one processor unit 114, a memory unit 118, for example formed from semiconductor random access memory (RAM) and read only memory (ROM), input/output (I/O) interfaces including a video interface 122, and I/O interfaces 116 and 117. A storage device 124 is provided and typically includes a hard disk drive 126 and a floppy disk drive 128. A CD-ROM drive 120 is typically provided as a non-volatile source of data. The components 114 to 128 of the computer module 102, typically communicate via an interconnected bus 130 and in a manner which results in a conventional mode of operation of the computer system 100 known to those in the relevant art.
In one of the simplest embodiments of watermarking, a watermark pattern is added to an original signal. The signal may be a still image, a video sequence or an audio stream. It is preferable for such watermark patterns to be imperceptible to human observers of the signal. To aid imperceptibility, a perceptual mask may be used to amplify the embedded mark in regions of high signal variation (where large signals are easy to hide) and to attenuate the watermark pattern in regions of low variation in the original signal.
In the detection of the watermark pattern in the resulting signal, it is desirable to use a matching technique that gives a reliable signal when the watermark pattern is present and no signal when the watermark pattern is not present. An optimum matching technique is correlation, and in particular, cross-correlation of the resulting signal with the watermark pattern, which provides peaks in the correlation signal at locations corresponding with positions where the watermark pattern was embedded into the original signal. Furthermore, detecting patterns using correlation performs equally well in one or more dimensions.
For detection of watermark patterns which have been perceptually masked during the watermarking operation, it is desirable to approximately invert the masking. Once the inverse masking is performed, cross-correlation is performed on the resultant signal of the inverse masking and the watermark pattern.
When the watermark pattern is correlated with the summation of the original signal and the watermark pattern, it is equivalent to the sum of cross-correlation between the watermark pattern and the original signal, and autocorrelation of the watermark pattern. The main contribution to the correlation signal is made by the autocorrelation portion.
Most naturally occurring patterns have autocorrelation signals which are rather broad. In contrast, when the autocorrelation is calculated for a wideband signal, that being a signal that has a spectral magnitude which covers a substantial part of the frequency domain, a much sharper autocorrelation signal is achieved. The spectral magnitude of a signal may be evaluated by Fast Fourier transforming the sampled signal data and a signal has a sharp autocorrelation signal if a peak of the autocorrelation is spread over a small number of samples. The spread of the autocorrelation signal of a given signal is inversely proportional to the spectral bandwidth of that given signal. For example, the autocorrelation signal of a white-noise signal is close to a delta function.
In a watermarking system, whether applied to audio, images, video or three-dimensional volumes, it is advantageous to use patterns for embedding which may be termed “white noise-like”, i.e. patterns that have a broad spectral bandwidth and a narrow autocorrelation signal. Pseudo random noise patterns are therefore often used as watermarks for embedding, as such patterns have sharp autocorrelation signals, as well as a large space of possible patterns. A measure of peak sharpness is the Full Width Half Maximum (FWHM) defined as the width of the main frequency lobe at the points where the signal's spectrum value has dropped by 50%. Accordingly, in the following, it is assumed that the patterns chosen for embedding are wideband.
FIG. 6 shows a schematic diagram of a process 300 of detecting the presence of a test pattern h(r) in a signal f(r). The test pattern h(r) is mathematically generated by the processor 114 using a test pattern equation in step 310 and correlated with the signal f(r) in step 320 to form a correlation signal g(r). If the signal f(r) includes the test pattern h(r) such that:
f(r)=k(r)+h(r)  (1)
    • where k(r) is the signal to which the test pattern h(r) was added for watermarking, the test pattern h(r) would have little or no correlation with signal k(r) and a significant correlation peak in the correlation signal g(r) at the position where the test pattern h(r) was added to signal k(r).
In pattern detection, the primary interest is the position of the underlying peak and whether or not the underlying peak height is above a certain threshold value. The presence of signal k(r) to which the test pattern h(r) is added for watermarking results in “noise” in the correlation signal g(r). Attenuated peaks are thus often hidden amongst such noise, or alternatively, the noise may be mistaken for a correlation peak. It is therefore desirable to test potential correlation peaks to determine whether they are merely attenuated true peaks, or merely noise.
The signals f(r) and h(r) are typically discrete signals, having a value for each n-dimensional sample space of r, and stored as n-dimensional arrays in the memory 118 of the computer system 100 (FIG. 1). The correlation of the discrete signal f(r) with the test pattern h(r) may be performed for the one-dimensional case as follows:
g ( x ) = f ( x ) h ( x ) = 1 M m = 0 M - 1 f ( x - m ) h * ( m ) ( 2 )
for x=0, 1, 2, . . . , M−1 with M≧A+C−1, where A and C are the sizes of the sampled arrays of signals f(x) and h(x) respectively, and h*(x) is the complex conjugate of signal h(x). As is known in the art, both signals f(x) and h(x) are “zero padded” to length M before Equation (2) is evaluated, typically by the processor 114.
Similar expressions hold for other dimensions. For any dimension the correlation theorem also provides the Fourier pair of:
f(r){circle around (×)}h(r)
Figure US07430301-20080930-P00001
F(w)H*(w)  (3)
    • where w is a frequency variable, also having dimension n, and F(w) and H(w) are the Discrete Fourier transforms of signals f(r) and h(r) respectively.
FIGS. 2A and 2B show examples of two one-dimensional real signals f(x) and h(x) respectively, each comprising 64 sample values. FIG. 2C shows the correlation function g(x) formed by correlating the example signals f(x) and h(x) shown in FIGS. 2A and 2B respectively. With both signals f(x) and h(x) being wideband, the correlation function g(x) has a peak spread over a limited number of sample intervals. The theoretical peak is not on a sample position thereby adding to the spread of the peak over a number of sample intervals and causing the attenuation of the peak value by about 35%. The detected peak is at the origin, which may be interpreted to mean that signal h(x) was not delayed before it was added to k(x) (not illustrated) to form signal f(x).
FIG. 4 shows a method 200 of enhanced peak detection in a correlation signal g(r). The method 200 is preferably implemented as software, such as an application program executing within the computer system 100 shown in FIG. 1. The application program may be stored in a computer readable medium, including the storage devices described above, for example. The application program is loaded into the computer from the computer readable medium, and then executed by the processor 114 of the computer system 100. A computer readable medium having such software or computer program recorded on it is a computer program product. The use of the computer program product in the computer preferably effects an advantageous apparatus for enhanced peak detection in a correlation signal g(r).
Typically, the application program is resident on the hard disk drive 126 and read and controlled in its execution by the processor 114. Intermediate storage of the program and any data fetched from the network 140 may be accomplished using the semiconductor memory 118, possibly in concert with the hard disk drive 126. In some instances, the application program may be supplied to the user encoded on a CD-ROM or floppy disk and read via the corresponding drive 120 or 128, or alternatively may be read by the user from the network 120 via the modem device 106. Still further, the software can also be loaded into the computer system 100 from other computer readable media.
The method of enhanced peak detection in a correlation signal g(r) may alternatively be implemented in dedicated hardware such as one or more integrated circuits performing the functions of enhanced peak detection in a correlation signal g(r). Such dedicated hardware may include graphic processors, digital signal processors, or one or more microprocessors and associated memories.
The method 200 starts in step 205 where signal f(r) is received as input by the processor 114 and stored in memory 118. Signal f(r) is received for testing whether the test pattern h(r) is present in signal f(r). Signal f(r) may be received in digitally sampled form previously stored on the storage device 124. Alternatively, such a digital signal f(r) may be received from the communication network 140, may be formed by taking an image using imaging device 108 or formed by recording an audio signal using microphone 109.
In step 210 the processor 114 then correlates signal f(r) with a test pattern h(r) to form correlation signal g(r). In the preferred arrangement, the test pattern h(r) is mathematically formed by the processor 114 from a mathematical equation. The test pattern h(r) may alternatively be stored within the computer system 100.
FIG. 5 illustrates the process 500, performed by the processor 114, of calculating the correlation of signal f(r) with the test pattern h(r) to form correlation signal g(r). In step 505 the Fourier transform F(w) is calculated of signal f(r) and stored in memory 118. In a similar manner and in step 506, the Fourier transform H(w) is calculated of test pattern h(r). The complex conjugate H*(w) of the Fourier transform H(w) is also calculated in step 507.
The Fourier transform F(w) is multiplied by the processor 114 with the complex conjugate H*(W) for all values of frequency variable w in step 510 to form a Fourier transform G(w). In the preferred arrangement, a spectral magnitude enhancement step 515 follows to form an enhanced Fourier transform G′(w). The enhancement may include high boost spectral filtering in which high frequency components of Fourier transform G(w) are enhanced. In an alternative arrangement a Phase Only Correlation is used instead of steps 510 and 515. Finally, in step 520, the correlation signal g(r) is calculated by the processor 114 by performing an inverse Fourier transform on the enhanced Fourier transform G′(w). The correlation signal g(r) is also stored in memory 118.
Returning to method 200 shown in FIG. 4, with the correlation signal g(r) calculated, in step 215 the processor searches for peaks in the magnitude of correlation signal g(r). These peaks may include true peaks, some of which are attenuated, and false peaks as a result of noise. In step 218 a priority queue is formed and stored in memory, the priority queue containing the peaks detected in step 215, with the peaks in the priority queue ordered according to the magnitude values of correlation signal g(r) at the peak positions.
Starting with the first peak on the priority queue, a region including a predetermined number of sample values of correlation signal g(r) is isolated around that peak to form correlation signal {tilde over (g)}(r) in step 220 by the processor 114. FIG. 3A shows the magnitude values of such a correlation signal {tilde over (g)}(x) formed from isolating 8 values around the peak of the example correlation signal g(x) shown in FIG. 2C.
The correlation signal {tilde over (g)}(r) is next up-sampled by the processor 114 using Fourier interpolation and at a higher sample rate which allows the underlying structure of the correlation signal {tilde over (g)}(r) to become visible. The Fourier interpolation provides up-sampling with no loss or attenuation of higher frequency components of the correlation signal {tilde over (g)}(r). In one implementation, interpolation using the chirp-z transform is used, as is known in the art. In another implementation of the Fourier interpolation the sinc interpolation kernel is used.
In the implementation described with reference to FIG. 4, zero padding is used to up-sample the correlation signal {tilde over (g)}(r), starting in step 221 where the Fourier transform {tilde over (G)}(w) is calculated of the correlation signal {tilde over (g)}(r). The Fourier transform {tilde over (G)}(w) is then zero-padded in step 222 to form Fourier transform G(w) which includes N times the number of samples in each dimension as does Fourier transform {tilde over (G)}(w). The inverse Fourier transform is next performed in step 225 on Fourier transform G(w) to form an up-sampled correlation signal g(r). This concludes the up-sampling steps.
The up-sampled correlation signal g(r) of the example correlation signal {tilde over (g)}(r) shown in FIG. 3A is shown in FIG. 3B, where the example correlation signal {tilde over (g)}(r) has been up-sampled by a factor of 8. In the example correlation signal {tilde over (g)}(r) the peak 601 is ½ a sample interval away from the true (theoretical) peak. In comparison, the peak 602 in FIG. 3B is now 1/16th of the original sample spacing away from the true peak and the value of the peak 602 is about 99.3% of the theoretical value, allowing a peak value to be found. Accordingly, the up-sampling resulted in an enhancement of the detected peak allowing the underlying value and its position to be better estimated. In particular, in the example, the up-sampling represents a 56% enhancement of the detected peak. The enhanced position allows the position of an embedded pattern in a watermark to be determined within a fraction of the sampling interval. This is particularly useful when a message is encoded in the position of the embedded pattern, making the detection of a correct position necessary for decoding of the message.
To further illustrate the enhancement of the peak, FIG. 3D shows a “best case” correlation signal 603, having a peak 604 falling exactly on the 5th sample interval. When this correlation signal 603 is up-sampled in the manner described above, the up-sampled correlation signal 605 results. It can be seen that the underlying structure of the up-sampled correlation signal g(r) (FIG. 3B) corresponds with that of the up-sampled correlation signal 605 (FIG. 3D).
Step 230 follows the up-sampling steps, where the processor 114 searches for a peak in the up-sampled correlation signal g(r). In step 235 the processor 114 determined whether the peak found in step 230 is above a predetermined threshold. If the peak is above the predetermined threshold, parameters of the peak are stored in step 236 and in memory 118. The parameters may include the modulus value of peak value, the phase of peak value, and position of peak value. The position of the enhanced peak value may be used to better determine where a pattern h(r) was embedded in the signal f(r).
From either step 235 or 236 the method 200 proceeds to step 240 where the processor 114 determines whether there are any peaks left in the priority queue. If there are peaks left in the priority queue, then the method 200 proceeds to step 220 where the processor 114 isolates a region around a next peak in the priority queue to form the correlation signal {tilde over (g)}(r). Steps 221 to 240 are repeated by the processor 114 with this correlation signal {tilde over (g)}(r), until the processor 114 determines in step 240 that all the peaks in the priority queue have been processed. The method 200 then ends in step 250.
Even though method 200 has been illustrated through use of a one-dimensional example, the method 200 is equally applicable to any n-dimensional test pattern h(r) and signal f(r). The test pattern h(r) and signal f(r) may also be complex signals.
It is noted that up-sampling of the entire correlation signal g(r) is possible, from which the peaks of the up-sampled signal may then be found. However, such a method is not computationally efficient. For example, consider the correlation of an 1024×1024 image f(r) with a template pattern h(r). The process 500 (FIG. 5) may be used. First the image is zero padded (not illustrated in FIG. 5) to double its size in each dimension, namely 2048×2048. Then it is transformed in step 505 using the Fast Fourier Transform (FFT) to form another 2048×2048 signal F(w). The template pattern h(r) of size 2048×2048 is mathematically formed and then also transformed in step 506 using the FFT and complex conjugated in step 507 to form H*(w).
The two transforms F(w) and H*(w) are multiplied in step 510 and the product is inverse transformed in step 520 to form the correlation signal g(r). In this example spectral magnitude enhancement (step 515) is not performed.
It is often preferable for the watermark pattern to have certain invariant characteristics, such as scale invariance or rotation invariance, for example. Logarithmic radial harmonic functions (LRHF) have rotational and scale invariance properties, yet do not necessarily exhibit any obvious rotational symmetry. This makes patterns based on LRHF's the preferred pattern to use.
In two dimensions, the LRHF l of the preferred implementation is in the form:
l mk(x,y)=w(x,y)·|x 2 +y 2|(ia m +p)/2 e ikθ  (4)
    • with k, p and αm being parameters of the LRHF l, and w(x,y) is a window function. The window function w(x,y) may be used to remove or de-emphasise a central region of the basis pattern g having frequencies above a predetermined frequency. FIGS. 7A and 7B show the real and imaginary parts respectively of a typical two dimensional LRHF lmk with parameters k=50 and αm≅50. As the LRHF lmk has negative values in its real and imaginary parts, the values the LRHF lmk have been normalised around a value of 127, with all values ranging from 0 to 255, 0 represented in black, 255 represented in white, and intermediate levels represented in levels of grey.
In most cases the input signal f(r) is a real signal, and any watermark pattern embedded therein can only have real values. Hence, a real part of a LRHF is used as the watermark pattern. However, the real part of a LRHF is not strictly speaking scale/rotation invariant, but rather periodically scale and rotation invariant.
However, the modulus of the cross-correlation of a real LRHF and a corresponding complex LRHF is substantially scale/rotation invariant. Hence, to overcome this difficulty, the (real) input signal f(r) is correlated with the full complex LRHF as pattern template h(r). This property of the LRHF makes the process 300 of detecting the presence of a test pattern h(r) in a signal f(r) substantially invariant to scale and rotation, even thought the embedded signal alone does not have strict invariance.
The proposed method 200 of enhanced peak detection in a correlation signal g(r) is particularly useful in watermarking systems using real watermark patterns and complex template patterns. The method 200 of enhanced peak detection typically allows significant increases in detection efficiency, especially when distortions such as scaling, rotation, and cropping have occurred.
The number of operations to determine the correlation signal g(r) is of the order R2 log2 R2, where R=2048=211. This is in the region of 100 million complex floating point operations. Now if the central 1024×1024 region of the correlation function g(r) is up-sampled by a factor of 8, R=8×1024=213 and the number of operation is of the order 1.7 billion complex floating point operations, a factor of 17 times more intensive than correlation without up-sampling.
It is further noted that a peak searching algorithm applied to the up-sampling of the entire correlation signal g(r) requires many more operations than merely peak searching in the locally up-sampled regions, especially if it is required to order the peaks in terms of their values.
The above is compared with the method 200 which only requires up-sampling in the regions where potential peaks have been identified. The extra computation (above the 100 million baseline for correlation of signals h(r) and f(r)) is much smaller than the baseline. So for example, if 20 peaks are searched for, but 1000 potential peaks are identified, then a region of 8×8 around each of the potential peaks may be up-sampled by a factor of 8. The number of complex floating point operations is of the order of 1000×64 log2 64=384,000. In other words, the extra computation takes 0.4% extra computation compared to 1700% extra computation for the full up-sampling approach.
The foregoing describes only some embodiments of the present invention, and modifications and/or changes can be made thereto without departing from the scope and spirit of the invention, the embodiments being illustrative and not restrictive.
In the context of this specification, the word “comprising” means “including principally but not necessarily solely” or “having” or “including” and not “consisting only of”. Variations of the word comprising, such as “comprise” and “comprises” have corresponding meanings.

Claims (24)

1. A method of enhanced peak detection in a complex correlation signal, said method comprising the steps of:
(a) identifying in said complex correlation signal at least one position with a modulus value above a first predetermined value; and
(b) for each said identified position performing the steps of:
(ba) forming a complex sub-signal by isolating a region of samples of said complex correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
(bb) up-sampling said complex sub-signal to a higher resolution using Fourier interpolation;
(bc) searching said up-sampled complex sub-signal for a peak value; and
(bd) storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
2. A method according to claim 1, wherein said parameters comprise at least one of:
modulus value of peak value;
phase of peak value; and
position of peak value.
3. A method according to claim 1, wherein Fourier interpolation comprises the steps of:
fourier transforming said complex sub-signal;
zero padding said complex sub-signal; and
inverse Fourier transforming said zero padded complex sub-signal.
4. A method according to claim 1, wherein said complex correlation signal is formed by correlating at least one wideband signal.
5. A method according to claim 1, wherein said higher resolution is at least two times the resolution of said complex correlation signal.
6. A method according to claim 1, further comprising:
ordering the identified at least one position according to said up-sampled complex signals; and
selecting at least one position from the identified at least one position based on said order.
7. An apparatus for enhanced peak detection in a complex correlation signal, said apparatus comprising:
means for identifying in said complex correlation signal at least one position with a modulus value above a first predetermined value; and
means for performing, on each identified position, the steps of:
forming a complex sub-signal by isolating a region of samples of said complex correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
up-sampling said complex sub-signal to a higher resolution using Fourier interpolation;
searching said up-sampled complex sub-signal for a peak value; and
storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
8. An apparatus according to claim 7, wherein said parameters comprise at least one of:
modulus value of peak value;
phase of peak value; and
position of peak value.
9. An apparatus according to claim 7, wherein Fourier interpolation comprises the steps of:
fourier transforming said complex sub-signal;
zero padding said complex sub-signal; and
inverse Fourier transforming said zero padded complex sub-signal.
10. An apparatus according to claim 7, wherein said complex correlation signal is formed by correlating at least one wideband signal.
11. An apparatus according to claim 7, wherein said higher resolution is at least two times the resolution of said complex correlation signal.
12. A computer-readable medium on which is stored a computer program for enhanced peak detection in a complex correlation signal, said program comprising:
code for identifying in said complex correlation signal at least one position with a modulus value above a first predetermined value; and
code for, for each identified position, performing the steps of:
forming a complex sub-signal by isolating a region of samples of said complex correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
up-sampling said complex sub-signal to a higher resolution using Fourier interpolation;
searching said up-sampled complex sub-signal for a peak value; and
storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
13. A computer-readable medium according to claim 12, wherein said parameters comprise at least one of:
modulus value of peak value;
phase of peak value; and
position of peak value.
14. A computer-readable medium according to claim 12, wherein Fourier interpolation comprises the steps of:
fourier transforming said complex sub-signal;
zero padding said complex sub-signal; and
inverse Fourier transforming said zero padded complex sub-signal.
15. A computer-readable medium according to claim 12 wherein said correlation signal is formed by correlating at least one wideband signal.
16. A method of detecting a watermark from a signal, said watermark having a basis pattern embedded, said method comprising the steps of:
(a) maintaining a test pattern;
(b) correlating said test pattern with said signal to form a complex correlation signal;
(c) identifying in said complex correlation signal at least one position with a modulus value above a first predetermined value; and
(d) for each said identified position performing the steps of:
(da) forming a complex sub-signal by isolating a region of samples of said complex correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
(db) up-sampling said complex sub-signal to a higher resolution using Fourier interpolation;
(dc) searching said up-sampled complex sub-signal for a peak value; and
(dd) storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
17. A method according to claim 16, wherein said signal comprises one of:
audio;
image; and
video.
18. A method according to claim 16, wherein Fourier interpolation comprises the steps of:
fourier transforming said complex sub-signal;
zero padding said complex sub-signal; and
inverse Fourier transforming said zero padded complex sub-signal.
19. A method according to claim 16, wherein said test pattern and said basis pattern are wideband signals.
20. A method according to claim 16, wherein said higher resolution is at least two times the resolution of said complex correlation signal.
21. An apparatus for detecting a watermark from a signal, said watermark having a basis pattern embedded, said apparatus comprising:
means for maintaining a test pattern;
means for correlating said test pattern with said signal to form a complex correlation signal;
means for identifying in said complex correlation signal at least one position with a modulus value above a first predetermined value; and
means for performing, for each said identified position, the steps of:
forming a complex sub-signal by isolating a region of samples of said complex correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
up-sampling said complex sub-signal to a higher resolution using Fourier interpolation;
searching said up-sampled complex sub-signal for a peak value; and
storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
22. An apparatus according to claim 21, wherein said signal comprises one of:
audio;
image; and
video.
23. A computer-readable storage medium on which is stored a computer program for detecting a watermark from a signal, said watermark having a basis pattern embedded, said program comprising:
code for maintaining a test pattern;
code for correlating said test pattern with said signal to form a complex correlation signal;
code for identifying in said complex correlation signal at least one position with a modulus value above a first predetermined value; and
code for performing, for each said identified position, the steps of:
forming a complex sub-signal by isolating a region of samples of said complex correlation signal, said region comprising substantially equal numbers of samples on opposite sides of said position;
up-sampling said complex sub-signal to a higher resolution using Fourier interpolation;
searching said up-sampled complex sub-signal for a peak value; and
storing parameters associated with said peak value when said peak value is greater than a second predetermined value.
24. A computer-readable medium according to claim 23, wherein said signal comprises one of:
audio;
image; and
video.
US10/499,141 2001-12-19 2002-12-18 Method for the enhancement of complex peaks Expired - Fee Related US7430301B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPR9634A AUPR963401A0 (en) 2001-12-19 2001-12-19 Methods for the enhancement of complex peaks
AUPR9634 2001-12-19
PCT/AU2002/001714 WO2003052676A1 (en) 2001-12-19 2002-12-18 Method for the enhancement of complex peaks

Publications (2)

Publication Number Publication Date
US20050111691A1 US20050111691A1 (en) 2005-05-26
US7430301B2 true US7430301B2 (en) 2008-09-30

Family

ID=3833248

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/499,141 Expired - Fee Related US7430301B2 (en) 2001-12-19 2002-12-18 Method for the enhancement of complex peaks

Country Status (3)

Country Link
US (1) US7430301B2 (en)
AU (1) AUPR963401A0 (en)
WO (1) WO2003052676A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0403327D0 (en) * 2004-02-14 2004-03-17 Koninkl Philips Electronics Nv Watermark detection
US20060157574A1 (en) * 2004-12-21 2006-07-20 Canon Kabushiki Kaisha Printed data storage and retrieval
AU2005201497B2 (en) * 2005-04-08 2006-12-14 Canon Kabushiki Kaisha Robust traceable marks
US20080240435A1 (en) * 2005-11-17 2008-10-02 Mehmet Utku Celik Perpetual Masking For Secure Watermark Embedding
KR101376556B1 (en) * 2006-01-17 2014-04-02 코닌클리케 필립스 엔.브이. Detection of presence of television signals embedded in noise using cyclostationary toolbox
EP3146415B1 (en) * 2014-05-20 2019-06-26 Advanced Silicon SA Method, apparatus and computer program for localizing an active stylus on a capacitive touch device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4149178A (en) * 1976-10-05 1979-04-10 American Technology Corporation Pattern generating system and method
US5028670A (en) 1988-07-15 1991-07-02 Bp Chemicals Limited Process for the gas-phase polymerization of olefins in a fluidized-bed reactor
US5261010A (en) * 1991-09-27 1993-11-09 Hughes Aircraft Comany Automatic mask threshold
EP0584701A2 (en) 1992-08-21 1994-03-02 Yozan Inc. Pattern matching circuit
GB2272594A (en) 1992-11-04 1994-05-18 Ibm Determining the type of document image
US5398113A (en) 1993-02-08 1995-03-14 Zygo Corporation Method and apparatus for surface topography measurement by spatial-frequency analysis of interferograms
US5844615A (en) * 1997-01-16 1998-12-01 General Instrument Corporation Communication of VBI data in digital television data streams
US5999561A (en) * 1997-05-20 1999-12-07 Sanconix, Inc. Direct sequence spread spectrum method, computer-based product, apparatus and system tolerant to frequency reference offset
US7154975B1 (en) * 1999-02-24 2006-12-26 Sony Deutschland Gmbh Receiving apparatus and synchronizing method for a digital telecommunication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3681157B2 (en) * 2000-06-27 2005-08-10 株式会社東芝 Digital watermark detection method, digital watermark detection apparatus, region determination method, and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4149178A (en) * 1976-10-05 1979-04-10 American Technology Corporation Pattern generating system and method
US5028670A (en) 1988-07-15 1991-07-02 Bp Chemicals Limited Process for the gas-phase polymerization of olefins in a fluidized-bed reactor
US5261010A (en) * 1991-09-27 1993-11-09 Hughes Aircraft Comany Automatic mask threshold
EP0584701A2 (en) 1992-08-21 1994-03-02 Yozan Inc. Pattern matching circuit
GB2272594A (en) 1992-11-04 1994-05-18 Ibm Determining the type of document image
US5398113A (en) 1993-02-08 1995-03-14 Zygo Corporation Method and apparatus for surface topography measurement by spatial-frequency analysis of interferograms
US5844615A (en) * 1997-01-16 1998-12-01 General Instrument Corporation Communication of VBI data in digital television data streams
US5999561A (en) * 1997-05-20 1999-12-07 Sanconix, Inc. Direct sequence spread spectrum method, computer-based product, apparatus and system tolerant to frequency reference offset
US7154975B1 (en) * 1999-02-24 2006-12-26 Sony Deutschland Gmbh Receiving apparatus and synchronizing method for a digital telecommunication system

Also Published As

Publication number Publication date
WO2003052676A1 (en) 2003-06-26
US20050111691A1 (en) 2005-05-26
AUPR963401A0 (en) 2002-01-24

Similar Documents

Publication Publication Date Title
US6671388B1 (en) Method and apparatus for detecting a watermark in a manipulated image
Solachidis et al. Circularly symmetric watermark embedding in 2-D DFT domain
EP1202552B1 (en) Method for generating and detecting watermarks
US6226387B1 (en) Method and apparatus for scene-based video watermarking
Tsai et al. DCT and DWT-based image watermarking by using subsampling
US20030086587A1 (en) Watermark detection
EP1117071A1 (en) Determination of a segmentation of a digital signal for inserting watermarking signals and the associated insertion.
US7430301B2 (en) Method for the enhancement of complex peaks
US20090060257A1 (en) Watermarking method resistant to geometric attack in wavelet transform domain
JP2003536337A (en) Method and apparatus for embedding a watermark
US20020184503A1 (en) Watermarking
KR100695675B1 (en) Geometric attack resistant watermarking method in wavelet transform domain
AU2002347217B2 (en) Method for the enhancement of complex peaks
JP2002354221A (en) Image processor, data processor, image and data processing method, and storage medium
Öztürk et al. A robust image watermarking in the joint time-frequency domain
US20050144456A1 (en) Robust digital image watermarking utilizing a Walsh transform algorithm
Campisi et al. Wavelet-based method for high-frequency subband watermark embedding
Nguyen et al. Performance and robustness analysis for some re-sampling detection techniques in digital images
Delannay et al. Classification of watermarking schemes robust against loss of synchronization
KR20040001213A (en) Apparatus and method for inserting and detecting digital image watermarking
EP1700265B1 (en) Estimation of quantisation step sizes for a watermark detector
Melgani et al. Near-lossless spread spectrum watermarking for multispectral remote sensing images
Zheng et al. RST invariant digital image watermarking based on a new phase-only filtering method
Stanković et al. Digital watermarking
KR100510354B1 (en) Image watermarking method resistant to geometric attack combined with removal attack

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LARKIN, KIERAN GERARD;FLETCHER, PETER ALLEINE;REEL/FRAME:015831/0049

Effective date: 20040719

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20160930